tailieunhanh - Báo cáo hóa học: " Research Article A Salient Missing Link in RFID Security Protocols"

Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article A Salient Missing Link in RFID Security Protocols | Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2011 Article ID 541283 9 pages doi 2011 541283 Research Article A Salient Missing Link in RFID Security Protocols Imran Erguler 1 2 Emin Anarim 2 and Gokay Saldamli3 1 National Research Institute of Electronics and Cryptology TUBITAK 41470 Kocaeli Turkey 2EE Department Bogazici University 34342 Istanbul Turkey 3MIS Department Bogazici University 34342 Istanbul Turkey Correspondence should be addressed to Imran Erguler ierguler@ Received 20 January 2011 Accepted 14 February 2011 Academic Editor Damien Sauveron Copyright 2011 Imran Erguler et al. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. In side channel analysis an attacker utilizes some legitimate function queries in order to collect the corresponding responses of a cryptographic system while it is functioning in a normal mode. If those responses reveal some unwanted information about the secrecy or privacy this leakage is called side channel information and these responses are called side channels. In this respect careless deployments of secure RFID authentication protocols are not exceptions and subject to side channel attacks. Focusing on lightweight RFID security protocols we examine the server responses for several RFID tags and realize that if the database querying is performed through a static process the RFID system is subject to timing attacks that could easily jeopardize the system s untraceability criteria. We demonstrate our attack on some well-known protocols and outline a countermeasure by precisely describing the database query mechanism. Furthermore we analyze the success probability of the attack in terms of the system parameters such as the number of tags number of cryptographic operations that have to be .

TÀI LIỆU LIÊN QUAN